• Hackertarget:一款发现攻击面的工具


    前言

    https://github.com/ismailtasdelen/hackertarget

    代码

    主要通过这家公司提供的API查询相关数据实现的功能,API看起来可以用很久。

    #!/usr/bin/env python
    # -*- coding: utf-8 -*-
    
    import requests
    
    hackertarget_logo = """
      _               _              _                          _
     | |_   __ _  __ | |__ ___  _ _ | |_  __ _  _ _  __ _  ___ | |_
     | '  / _` |/ _|| / // -_)| '_||  _|/ _` || '_|/ _` |/ -_)|  _|
     |_||_|\__,_|\__||_\_\___||_|   \__|\__,_||_|  \__, |\___| \__|
                                                    |___/
                     Ismail Tasdelen
     | github.com/ismailtasdelen | linkedin.com/in/ismailtasdelen |
    """
    
    menu = """
    [1] Traceroute
    [2] Ping Test
    [3] DNS Lookup
    [4] Reverse DNS
    [5] Find DNS Host
    [6] Find Shared DNS
    [7] Zone Transfer
    [8] Whois Lookup
    [9] IP Location Lookup
    [10] Reverse IP Lookup
    [11] TCP Port Scan
    [12] Subnet Lookup
    [13] HTTP Header Check
    [14] Extract Page Links
    [15] Exit
    """
    
    print hackertarget_logo
    print menu
    
    def run():
    
        try:
            choice = input("Which option number : ")
    
            if choice == 1:
                print("
    ")
                print("[+] Traceroute script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/mtr/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 2:
                print("
    ")
                print("[+] Ping Test script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/nping/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 3:
                print("
    ")
                print("[+] DNS Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/dnslookup/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 4:
                print("
    ")
                print("[+] Reverse DNS script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/reversedns/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 5:
                print("
    ")
                print("[+] Find DNS Host script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/hostsearch/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 6:
                print("
    ")
                print("[+] Find Shared DNS script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/findshareddns/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 7:
                print("
    ")
                print("[+] Zone Transfer script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/zonetransfer/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 8:
                print("
    ")
                print("[+] Whois Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/whois/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 9:
                print("
    ")
                print("[+] IP Location Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/geoip/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 10:
                print("
    ")
                print("[+] Reverse IP Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/reverseiplookup/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 11:
                print("
    ")
                print("[+] TCP Port Scan script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/nmap/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 12:
                print("
    ")
                print("[+] Subnet Lookup script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/subnetcalc/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 13:
                print("
    ")
                print("[+] HTTP Header Check script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/httpheaders/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 14:
                print("
    ")
                print("[+] Extract Page Links script running..")
                target = raw_input("[+] Target : ")
                print("
    ")
                url = "https://api.hackertarget.com/pagelinks/?q=" + target
                request = requests.get(url)
                txt = request.text
                print(txt)
    
            elif choice == 15:
                exit()
    
        except KeyboardInterrupt:
            print("
    Aborted!")
            quit()
        except:
            print("Invalid Optioin !
    ")
            return run()
    run()
    
  • 相关阅读:
    树状数组与线段树基础
    阿里云服务器低价购买及域名解析
    ENVI5.3安装教程(含软件下载)
    05 ArcGIS JS API 4.12版本监听view-change事件
    jQuery的AJAX请求成功,但是跳转到error的解决方法
    04 ArcGIS JS API 4.12加载天地图
    02 Portal for ArcGIS 10.7安装部署教程(linux环境)
    10 webpack4.0学习笔记——热替换_devServer
    09 webpack4.0学习笔记——配置文件_HtmlWebpackPlugin使用
    08 webpack4.0学习笔记——配置文件_DefinePlugin使用
  • 原文地址:https://www.cnblogs.com/17bdw/p/10842038.html
Copyright © 2020-2023  润新知